Q1. Internet Key Exchange (IKE) is responsible for which two functions? (Choose two.)
A. Establishing network speed parameters
B. Verifying the client's patch level
C. Negotiating algorithms to use
D. Exchanging key information
Answer: A,B
Q2. To which IP configuration does the CIDR notation 192.168.1.1/25 refer?
A. 192.168.1.1 255.255.255.64
B. 192.168.1.1 255.255.255.1
C. 192.168.1.1 255.255.255.32
D. 192.168.1.1 255.255.255.256
E. 192.168.1.1 255.255.255.128
Answer: E
Q3. A private network that allows members of an organization to exchange data is an:
A. Extranet
B. Ethernet
C. Intranet
D. Internet
Answer: C
Q4. This question requires that you evaluate the underlined text to determine if it is correct.
A secondary zone is the first DNS zone to which all updates for the records that belong to that zone are written.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed" if the underlined text makes the statement correct.
A. Primary zone
B. Stub zone
C. Conditional forwarding zone
D. No change is needed.
Answer: A
Q5. DRAG DROP
Match each IP address to its corresponding IPv4 address class.
To answer, drag the appropriate IP address from the column on the left to its IPv4 address class on the right. Each IP address may be used once, more than once, or not at all. Each correct match is worth one point.
Answer:
Q6. In a physical star topology, the central device is referred to as a:
A. Bridge
B. Server
C. segmenter
D. Hub
Answer: D
Q7. Which subnet mask is valid?
A. 255.255.255.240
B. 255.255.255.228
C. 255.255.255.164
D. 255.255.255.245
Answer: A
Q8. Which of the following uses pointer records and A records?
A. IDS
B. DNS Server
C. NAT Server
D. IPS
Answer: B
Q9. For which two reasons should you use IPsec between computers? (Choose two.)
A. Data compression
B. Data integrity
C. Data redundancy
D. Data confidentiality
Answer: A,B
Q10. What are two characteristics of the CSMA/CD access method? (Choose two.)
A. It checks to see if a collision has been detected.
B. It does a round robin search for requests to transmit from all nodes on the network.
C. It signals its intent to transmit on the network.
D. It waits until the transmission medium is idle.
Answer: B,C
Q11. The function of a router is to:
A. Provide IP subnet masks for hosts.
B. Forward traffic to other networks.
C. Broadcast routing tables to clients.
D. Store tables for name resolution.
Answer: B
Q12. Which type of network covers the broadest area?
A. WAN
B. CAN
C. LAN
D. PAN
Answer: A
Q13. HOTSPOT
For each of the following statements, select Yes if the statement is true. Otherwise, select No. Each correct selection is worth one point.
Answer:
Q14. Which of the following services masks internal IP addresses from outside the network?
A. DHCP
B. WINS
C. NAT
D. DNS
Answer: C
Q15. This question requires that you evaluate the underlined text to determine if it is correct.
WEP wireless encryption is the most susceptible to interception and decryption.
Select the correct answer if the underlined text does not make the statement correct. Select 'No change is needed'' if the underlined text makes the statement correct
A. WPA-AES
B. WPA2
C. WPA-PSK
D. No change is needed
Answer: D